2011
DOI: 10.1109/mnet.2011.6033036
|View full text |Cite
|
Sign up to set email alerts
|

An early warning system against malicious activities for smart grid communications

Abstract: here is high expectation recently for machine-tomachine (M2M) communications over wired and wireless links. Various applications of M2M have already started to emerge in various sectors such as healthcare, vehicular ad hoc networks, smart home technologies, and so on [1]. The evolution of M2M has also begun in developing a smart power grid framework, referred to as the smart grid (SG) [2,3]. An electric grid having smart or intelligent capability allows power providers, distributors, and consumers -operating r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0
1

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 108 publications
(40 citation statements)
references
References 13 publications
0
39
0
1
Order By: Relevance
“…Generally, data analysis can help to make predictions based on collected data from many M2M devices during a specific period of time. A wide range of problems such as traffic congestion, power distribution anomalies (e.g., voltage level spikes), malicious attacks, and so on may fall into the scope of prediction [39]. The data mining technologies can be applied to analyze collected data from M2M devices.…”
Section: ) Device-centric M2m Systemsmentioning
confidence: 99%
See 2 more Smart Citations
“…Generally, data analysis can help to make predictions based on collected data from many M2M devices during a specific period of time. A wide range of problems such as traffic congestion, power distribution anomalies (e.g., voltage level spikes), malicious attacks, and so on may fall into the scope of prediction [39]. The data mining technologies can be applied to analyze collected data from M2M devices.…”
Section: ) Device-centric M2m Systemsmentioning
confidence: 99%
“…Fadlullah et al [39] studied the energy M2M system for smart grid with a system-centric M2M task, i.e., fault prediction. Specifically, they modeled the malicious and/or abnormal events, which can compromise the security and privacy of smart grid users, as a Gaussian process.…”
Section: A Theoretical Solutions For M2m Systems 1) Static-system-pementioning
confidence: 99%
See 1 more Smart Citation
“…By generalizing previous proposals [18], [22], [23], we present a hierarchical network structure of smart grid including three layers, i.e. a residential network layer, a community network layer, and a regional network layer, as illustrated in Fig.…”
Section: Smart Grid Network Architecturementioning
confidence: 99%
“…Cyber security is of paramount importance in smart grid as communications are deeply involved in its operations [8], [9], [10], [11], [12], [13]. All the data transmitted in the grid must be authenticated and secured against malicious modification.…”
Section: Introductionmentioning
confidence: 99%